E-Books
Guerrilla Warfare
Ches volume is the other side of the coin, as he details his style of hit-and-run tactics that were paramount to the overthrow of Cubas government and the establishment of the Castro regime that Didions Cubans fled from. Published in 1969, this sports three of Ches most famous essays on guerrilla combat tactics.
Download
Secrets of Methamphetamine Manufacture
The classic text on clandestine chemistry just got even better. This Fifth Edition of Secrets of Methamphetamine Manufacture Including Recipes for MDA, Ecstasy, and Other Psychedelic Amphetamines contains the wisdom and recipes from Uncle Fester you’ve come to know and trust, along with some totally new techniques you won’t find anywhere else!
Steal This Book – PDF
The book, in the style of the counter-culture, mainly focused on ways to fight the government, and against corporations in any way possible. The book is written in the form of a guide to the youth. Hoffman, a political and social activist himself, used many of his own activities as the inspiration for some of his advice in Steal This Book.
Download
The Basics of Hacking and Penetration Testing Ethical Hacking and Penetration Testing Made Easy (PDF)
The Basics of Hacking and Penetration Testing serves as an introduction to the steps required to complete a penetration test or perform an ethical hack. You learn how to properly utilize and interpret the results of modern day hacking tools; which are required to complete a penetration test. Tool coverage will include, Backtrack Linux, Google, Whois, Nmap, Nessus, Metasploit, Netcat, Netbus, and more. A simple and clean explanation of how to utilize these tools will allow you to gain a solid understanding of each of the four phases and prepare them to take on more in-depth texts and topics. This book includes the use of a single example (pen test target) all the way through the book which allows you to clearly see how the tools and phases relate.
The Art of Intrusion – Kevin D. Mitnick (PDF)
Hacker extraordinaire Kevin Mitnick delivers the explosive encore to his bestselling The Art of Deception
Kevin Mitnick, the world’s most celebrated hacker, now devotes his life to helping businesses and governments combat data thieves, cybervandals, and other malicious computer intruders. In his bestselling The Art of Deception, Mitnick presented fictionalized case studies that illustrated how savvy computer crackers use “social engineering” to compromise even the most technically secure computer systems. Now, in his new book, Mitnick goes one step further, offering hair-raising stories of real-life computer break-ins-and showing how the victims could have prevented them. Mitnick’s reputation within the hacker community gave him unique credibility with the perpetrators of these crimes, who freely shared their stories with him-and whose exploits Mitnick now reveals in detail for the first time, including:
The Art of Deception
The world’s most infamous hacker offers an insider’s view of the low-tech threats to high-tech security Kevin Mitnick’s exploits as a cyber-desperado and fugitive form one of the most exhaustive FBI manhunts in history and have spawned dozens of articles, books, films, and documentaries. Since his release from federal prison, in 1998, Mitnick has turned his life around and established himself as one of the most sought-after computer security experts worldwide. Now, in The Art of Deception, the world’s most notorious hacker gives new meaning to the old adage, “It takes a thief to catch a thief.”
Continue Reading
eBay Hacks
100 Industrial-Strength Tips & Tools
Want to know how best to use eBay? Whether you’re a newcomer or longtime user, eBay Hacks will teach you to become efficient as both a buyer and seller. You’ll find a wide range of topics, from monitoring the bidding process, getting refunds, and fixing photos so that sale items look their best, to in-depth tips for running a business on eBay and writing scripts that automate some of the most tedious tasks.
Dangerous Google – Searching for Secrets
Information which should be
protected is very often publicly
available, revealed by careless
or ignorant users. The result is
that lots of confidential data is
freely available on the Internet
– just Google for it.
This ebook provides many example of Google queries for hacking, providing security-minded administrators information to defend against hacks using Google searches.